Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Konstantinos Demertzis, Lazaros S. Iliadis |
Evolving Smart URL Filter in a Zone-Based Policy Firewall for Detecting Algorithmically Generated Malicious Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SLDS ![In: Statistical Learning and Data Sciences - Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings, pp. 223-233, 2015, Springer, 978-3-319-17090-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
Automated and Optimized FDD-Based Method to Fix Firewall Misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 14th IEEE International Symposium on Network Computing and Applications, NCA 2015, Cambridge, MA, USA, September 28-30, 2015, pp. 63-67, 2015, IEEE Computer Society, 978-1-5090-1849-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac |
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS ![In: Australasian Conference on Information Systems, ACIS 2015, Adelaide, SA, Australia, 30 November - 4 December 2015., pp. 98, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
15 | Hailu Tegenaw, Mesfin Kifle |
Application aware firewall architecture to enhance performance of enterprise network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICON ![In: AFRICON 2015, Addis Ababa, Ethiopia, September 14-17, 2015, pp. 1-10, 2015, IEEE, 978-1-4799-7498-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Wenli Shang, Ming Wan, Peng Zeng 0001, Quansheng Qiao |
Research on self-learning method on generation and optimization of industrial firewall rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSec ![In: 2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015, pp. 47-52, 2015, IEEE, 978-1-4673-6988-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Simon N. Foley, Ultan Neville |
A firewall algebra for OpenStack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015, pp. 541-549, 2015, IEEE, 978-1-4673-7876-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Lin Zhang, Mengxing Huang |
A Firewall Rules Optimized Model Based on Service-Grouping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE WISA ![In: 12th Web Information System and Application Conference, WISA 2015, Jinan, China, September 11-13, 2015, pp. 142-146, 2015, IEEE Computer Society, 978-1-4673-9371-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Cornelius Diekmann, Lars Hupel, Georg Carle |
Semantics-Preserving Simplification of Real-World Firewall Rule Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FM ![In: FM 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, pp. 195-212, 2015, Springer, 978-3-319-19248-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Michael LeMay, Carl A. Gunter |
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Logic, Rewriting, and Concurrency ![In: Logic, Rewriting, and Concurrency - Essays dedicated to José Meseguer on the Occasion of His 65th Birthday, pp. 404-426, 2015, Springer, 978-3-319-23164-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Ferney A. Maldonado-Lopez, Eusebi Calle, Yezid Donoso |
Detection and prevention of firewall-rule conflicts on software-defined networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RNDM@WMNC ![In: 7th International Workshop on Reliable Networks Design and Modeling, RNDM 2015, Munich, Germany, October 5-7, 2015, pp. 259-265, 2015, IEEE, 978-1-4673-8050-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Haining Chen, Omar Chowdhury, Jing Chen 0005, Ninghui Li, Robert W. Proctor |
Towards quantification of firewall policy complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotSoS ![In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015, pp. 18:1-18:2, 2015, ACM, 978-1-4503-3376-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Zhenfang Wang, ZhiHui Lu 0002, Jie Wu 0003, Kang Fan |
CPFirewall: A Novel Parallel Firewall Scheme for FWaaS in the Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Advances in Services Computing - 9th Asia-Pacific Services Computing Conference, APSCC 2015, Bangkok, Thailand, December 7-9, 2015, Proceedings, pp. 121-136, 2015, Springer, 978-3-319-26978-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Dennis Appelt, Cu Duy Nguyen, Lionel C. Briand |
Behind an Application Firewall, Are We Safe from SQL Injection Attacks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST ![In: 8th IEEE International Conference on Software Testing, Verification and Validation, ICST 2015, Graz, Austria, April 13-17, 2015, pp. 1-10, 2015, IEEE Computer Society, 978-1-4799-7125-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Fouad Amine Guenane |
Network security management using a novel firewall Cloud-based service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CFIP/NOTERE ![In: International Conference on Protocol Engineering, ICPE 2015, and International Conference on New Technologies of Distributed Systems, NTDS 2015 [CFIP (Colloque francophone sur l'ingénierie des protocoles) / NOTERE (Nouvelles Technologies de la Répartition)], Paris, France, July 22-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4673-9265-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Jozef Filipek, Ladislav Hudec |
Distributed firewall using PKI in mobile Ad Hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CompSysTech ![In: Proceedings of the 16th International Conference on Computer Systems and Technologies, CompSysTech, Dublin, Ireland, June 25 - 26, 2015, pp. 292-298, 2015, ACM, 978-1-4503-3357-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham 0001 |
A Study of Web Application Firewall Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 501-510, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Tomokazu Otsuka, Gada, Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin |
Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: 39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, July 1-5, 2015, pp. 127-132, 2015, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Thuy Vinh Tran, Heejune Ahn |
A network topology-aware selectively distributed firewall control in SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: International Conference on Information and Communication Technology Convergence, ICTC 2015, Jeju Island, South Korea, October 28-30, 2015, pp. 89-94, 2015, IEEE, 978-1-4673-7116-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Kazunori Kamiya, Kazufumi Aoki, Kensuke Nakata, Toru Sato, Hiroshi Kurakami, Masaki Tanikawa |
The method of detecting malware-infected hosts analyzing firewall and proxy logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSITT ![In: 10th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2015, Colombo, Sri Lanka, August 4-7, 2015, pp. 1-3, 2015, IEEE, 978-4-8855-2298-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | A. Fairuzullah, Ahmad Noraziah, Wan Maseri Binti Wan Mohd, Tutut Herawan |
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaEng ![In: Proceedings of the Second International Conference on Advanced Data and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26, 2015, pp. 3-10, 2015, Springer, 978-981-13-1797-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Simeon Miteff, Scott Hazelhurst |
NFShunt: A Linux firewall with OpenFlow-enabled hardware bypass. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NFV-SDN ![In: IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2015, San Francisco, CA, USA, November 18-21, 2015, pp. 100-106, 2015, IEEE, 978-1-4673-6884-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner |
Towards Standardising Firewall Reporting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberICS/WOS-CPS@ESORICS ![In: Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers, pp. 127-143, 2015, Springer, 978-3-319-40384-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Ladislav Balik, Josef Horalek, Ondrej Hornig, Vladimir Sobeslav, Rafael Dolezal, Kamil Kuca |
Endpoint Firewall for Local Security Hardening in Academic Research Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI (2) ![In: Computational Collective Intelligence - 7th International Conference, ICCCI 2015, Madrid, Spain, September 21-23, 2015, Proceedings, Part II, pp. 246-255, 2015, Springer, 978-3-319-24305-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Kangshun Li, Zhichao Wen |
The Privacy Protection Search of Spam Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers, pp. 648-658, 2015, Springer, 978-981-10-0355-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Burkhard Wiegel |
Securing Enterprise Email Communication on both Sides of the Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2015 - Highlights of the Information Security Solutions Europe 2015 Conference, Berlin, Germany, November 1-2, 2015, pp. 46-57, 2015, Springer, 978-3-658-10933-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Ruud Koolen, Julien Schmaltz |
Formal Methods for MILS: Formalisations of the GWV Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILS@HiPEAC ![In: International Workshop on MILS: Architecture and Assurance for Secure Systems, MILS@HiPEAC 2015, Amsterdam, The Netherlands, January 20, 2015., 2015, Zenodo. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Yong Hu, Daniel Müller-Gritschneder, Martha Johanna Sepúlveda, Guy Gogniat, Ulf Schlichtmann |
Automatic ILP-based Firewall Insertion for Secure Application-Specific Networks-on-Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INA-OCMC@HiPEAC ![In: Ninth International Workshop on Interconnection Network Architectures: On-Chip, Multi-Chip, INA-OCMC@HiPEAC 2015, Amsterdam, Netherlands, January 19, 2015, pp. 9-12, 2015, IEEE Computer Society, 978-1-4799-1870-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Herny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah |
Portable Toolkit for Penetration Testing and Firewall Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSec ![In: Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, CyberSec 2015, Jakarta, Indonesia, October 29-31, 2015, pp. 90-94, 2015, IEEE Computer Society, 978-1-4673-8499-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Om Prakash Patel, Aruna Tiwari, Vikram Patel, Ojas Gupta |
Quantum Based Neural Network Classifier and Its Application for Firewall to Detect Malicious Web Request. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCI ![In: IEEE Symposium Series on Computational Intelligence, SSCI 2015, Cape Town, South Africa, December 7-10, 2015, pp. 67-74, 2015, IEEE, 978-1-4799-7560-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Miltos D. Grammatikakis, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Marcello Coppola |
High-level security services based on a hardware NoC Firewall module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISES ![In: 12th International Workshop on Intelligent Solutions in Embedded Systems, WISES 2015, Ancona, Italy, October 29-30, 2015, pp. 73-78, 2015, IEEE, 978-8-8875-4808-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
15 | Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson |
Examining How the Great Firewall Discovers Hidden Circumvention Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 2015 ACM Internet Measurement Conference, IMC 2015, Tokyo, Japan, October 28-30, 2015, pp. 445-458, 2015, ACM, 978-1-4503-3848-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan |
Dynamic rule and rule-field optimisation for improving firewall performance and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 8(4), pp. 250-257, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim, Soon-Young Jung |
Practical firewall policy inspection using anomaly detection and its visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 71(2), pp. 627-641, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Zubair Nabi |
A $35 Firewall for the Developing World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1405.2517, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Michael LeMay, Carl A. Gunter |
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1404.3465, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Roya Ensafi, Philipp Winter, Abdullah Mueen 0001, Jedidiah R. Crandall |
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1410.0735, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Xiangjian He, Thawatchai Chomsiri, Priyadarsi Nanda, Zhiyuan Tan 0001 |
Improving cloud network security using the Tree-Rule firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 30, pp. 116-126, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak |
Firewall Policy Reconnaissance: Techniques and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 9(2), pp. 296-308, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Harsh Taneja, Angela Xiao Wu |
Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 30(5), pp. 297-309, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Wei-Ming Chen, Hsin-Hung Chiang, Kai-Di Chang, Han-Chieh Chao, Jiann-Liang Chen |
Backup routing firewall mechanism in P2P environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 7(1), pp. 16-23, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Qinghua Yang, Yu Liu |
What's on the other side of the great firewall? Chinese Web users' motivations for bypassing the Internet censorship. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 37, pp. 249-257, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ehab Al-Shaer |
Automated Firewall Analytics - Design, Configuration and Optimization ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
DOI RDF |
|
15 | Ashok Singh Sairam, Rahul Kumar, Pratima Biswas |
Implementation of an Adaptive Traffic-aware Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 385, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Pedro Adão, Claudio Bozzato, G. Dei Rossi, Riccardo Focardi, Flaminia L. Luccio |
Mignis: A Semantic Based Tool for Firewall Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 351-365, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Meng Liu 0010, Wan-Chun Dou, Shui Yu 0001, Zhensheng Zhang |
A clusterized firewall framework for cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014, pp. 3788-3793, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Casimer M. DeCusatis, Peter Mueller |
Virtual Firewall Performance as a Waypoint on a Software Defined Overlay Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/CSS/ICESS ![In: 2014 IEEE International Conference on High Performance Computing and Communications, 6th IEEE International Symposium on Cyberspace Safety and Security, 11th IEEE International Conference on Embedded Software and Systems, HPCC/CSS/ICESS 2014, Paris, France, August 20-22, 2014, pp. 819-822, 2014, IEEE, 978-1-4799-6123-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Hammad Kabir, Raimo Kantola, Jesus Llorente Santos |
Security Mechanisms for a Cooperative Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/CSS/ICESS ![In: 2014 IEEE International Conference on High Performance Computing and Communications, 6th IEEE International Symposium on Cyberspace Safety and Security, 11th IEEE International Conference on Embedded Software and Systems, HPCC/CSS/ICESS 2014, Paris, France, August 20-22, 2014, pp. 814-818, 2014, IEEE, 978-1-4799-6123-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Miltos D. Grammatikakis, Kyprianos Papadimitriou, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros, Ioannis Christoforakis, Marcello Coppola |
Security Effectiveness and a Hardware Firewall for MPSoCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/CSS/ICESS ![In: 2014 IEEE International Conference on High Performance Computing and Communications, 6th IEEE International Symposium on Cyberspace Safety and Security, 11th IEEE International Conference on Embedded Software and Systems, HPCC/CSS/ICESS 2014, Paris, France, August 20-22, 2014, pp. 1032-1039, 2014, IEEE, 978-1-4799-6123-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao 0001 |
Towards a Reliable SDN Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ONS ![In: Open Networking Summit 2014 - Research Track, ONS 2014, Santa Clara, CA, USA, March 2-4, 2014, 2014, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Zeyad S. Aaber, Richard M. Crowder, Victor I. Chang 0001, Nawfal F. Fadhel, Gary B. Wills |
Towards a Framework for Securing a Document outside an Organisational Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: IEEE 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014, pp. 1057-1062, 2014, IEEE Computer Society, 978-1-4799-4093-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | |
Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCI ![In: 4th USENIX Workshop on Free and Open Communications on the Internet, FOCI '14, San Diego, CA, USA, August 18, 2014., 2014, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Byoung-Koo Kim, Dong-Ho Kang, Jung-Chan Na, Beom-Hwan Chang, Tai-Myoung Chung |
Design of Industrial Firewall System Based on Multiple Access Control Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCC ![In: Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014, pp. 535-544, 2014, Springer, 978-94-017-8797-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCC ![In: Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014, pp. 525-534, 2014, Springer, 978-94-017-8797-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad M. Masud 0001, Umniya Mustafa, Zouheir Trabelsi |
A data driven firewall for faster packet filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMNET ![In: Fourth International Conference on Communications and Networking, ComNet 2014, Hammamet, Tunisia, March 19-22, 2014, pp. 1-5, 2014, IEEE, 978-1-4799-3762-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ahmed Khoumsi, Wadie Krombi, Mohammed Erradi |
A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers, pp. 221-236, 2014, Springer, 978-3-319-17039-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ehab S. Elmallah, Mohamed G. Gouda |
Hardness of Firewall Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETYS ![In: Networked Systems - Second International Conference, NETYS 2014, Marrakech, Morocco, May 15-17, 2014. Revised Selected Papers, pp. 153-168, 2014, Springer, 978-3-319-09580-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sebastian Biedermann, Jakub Szefer |
SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings, pp. 273-290, 2014, Springer, 978-3-319-13256-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Dirk Achenbach, Jörn Müller-Quade, Jochen Rill |
Universally Composable Firewall Architectures Using Trusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BalkanCryptSec ![In: Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers, pp. 57-74, 2014, Springer, 978-3-319-21355-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Umniya Mustafa |
A Web-based Firewall Simulator Tool for Information Security Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACE ![In: Sixteenth Australasian Computing Education Conference, ACE 2014, Auckland, New Zealand, January 2014, pp. 83-90, 2014, Australian Computer Society, 978-1-921770-31-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan 0001 |
A Stateful Mechanism for the Tree-Rule Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, pp. 122-129, 2014, IEEE Computer Society, 978-1-4799-6513-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad Ghoniem, Georgiy Shurkhovetskyy, Ahmed Bahey, Benoît Otjacques |
VAFLE: visual analytics of firewall log events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Visualization and Data Analysis ![In: Visualization and Data Analysis 2014, San Francisco, CA, USA, February 3-5, 2014, pp. 901704, 2014, SPIE, 978-0-8194-9934-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Marco Cereia, Ivan Cibrario Bertolotti, Luca Durante, Adriano Valenzano |
Latency evaluation of a firewall for industrial networks based on the Tofino Industrial Security Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of the 2014 IEEE Emerging Technology and Factory Automation, ETFA 2014, Barcelona, Spain, September 16-19, 2014, pp. 1-8, 2014, IEEE, 978-1-4799-4846-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yihuan Xing, Ford-Long Wong, Akash Kumar 0001 |
Lightweight Bare-Metal Stateful Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014, Singapore, November 18-21, 2014, pp. 53-58, 2014, IEEE Computer Society, 978-1-4799-6474-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Amina Saadaoui, Nihel Ben Youssef Ben Souayeh, Adel Bouhoula |
Formal approach for managing firewall misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCIS ![In: IEEE 8th International Conference on Research Challenges in Information Science, RCIS 2014, Marrakech, Morocco, May 28-30, 2014, pp. 1-10, 2014, IEEE, 978-1-4799-2393-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Nguyen Manh Hung, Vu Duy Nhat |
B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISDA ![In: Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2014, Cau Giay, Vietnam, December 14-17, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-5431-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sven Hager, Frank Winkler, Björn Scheuermann 0001, Klaus Reinhardt |
MPFC: Massively Parallel Firewall Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: IEEE 39th Conference on Local Computer Networks, LCN 2014, Edmonton, AB, Canada, 8-11 September, 2014, pp. 305-313, 2014, IEEE Computer Society, 978-1-4799-3778-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Stephan Windmüller |
Simplifying Firewall Setups by Using Offline Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Integr. Des. Process. Sci. ![In: J. Integr. Des. Process. Sci. 17(3), pp. 59-69, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim |
Database Security System for Applying Sophisticated Access Control via Database Firewall Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Informatics ![In: Comput. Informatics 32(6), pp. 1192-1211, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Kristián Valentín, Michal Malý |
Network Firewall using Artificial Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Informatics ![In: Comput. Informatics 32(6), pp. 1312-1327, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Qi Duan, Ehab Al-Shaer |
Traffic-aware dynamic firewall policy management: techniques and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 51(7), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Leonardo Maccari, Renato Lo Cigno |
Waterwall: a cooperative, distributed firewall for wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Wirel. Commun. Netw. ![In: EURASIP J. Wirel. Commun. Netw. 2013, pp. 225, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Fei Chen 0001, Bezawada Bruhadeshwar, Alex X. Liu |
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 21(3), pp. 857-868, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Harsh Taneja, Angela Xiao Wu |
Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain web user behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1305.3311, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot |
Management of stateful firewall misconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 39, pp. 64-85, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Zouheir Trabelsi, Liren Zhang, Safaa Zeidan, Kilani Ghoudi |
Dynamic traffic awareness statistical model for firewall performance enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 39, pp. 160-172, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Kasom Koht-Arsa, Surasak Sanguanpong |
A Centralized State Repository Approach to Highly Scalable and High-Availability Parallel Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 8(7), pp. 1664-1676, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Sylvain Hallé, Eric Lunaud Ngoupe, Roger Villemaire, Omar Cherkaoui |
Distributed firewall anomaly detection through LTL model checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 27-31, 2013, pp. 194-201, 2013, IEEE, 978-1-4673-5229-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | David Goergen, Thibault Cholez, Jérôme François, Thomas Engel 0001 |
A semantic firewall for Content-Centric Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 27-31, 2013, pp. 478-484, 2013, IEEE, 978-1-4673-5229-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Miguel Garcia, Nuno Ferreira Neves, Alysson Bessani |
An intrusion-tolerant firewall design for protecting SIEM systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN Workshops ![In: 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, DSN Workshops 2013, Budapest, Hungary, June 24-27, 2013, pp. 1-7, 2013, IEEE Computer Society, 978-1-4799-0181-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer |
Objective metrics for firewall security: A holistic view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013, pp. 470-477, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Robert Benner, Victor T. E. Echeverria, Uzoma Onunkwo, Jay Patel, David Zage |
Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: International Conference on Computing, Networking and Communications, ICNC 2013, San Diego, CA, USA, January 28-31, 2013, pp. 637-641, 2013, IEEE Computer Society, 978-1-4673-5287-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ondrej Rysavý, Jaroslav Ráb, Miroslav Svéda |
Improving security in SCADA systems through firewall policy analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FedCSIS ![In: Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, Kraków, Poland, September 8-11, 2013., pp. 1423-1428, 2013, 978-1-4673-4471-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Achim D. Brucker, Lukas Brügger, Burkhart Wolff |
hol-TestGen/fw - An Environment for Specification-Based Firewall Conformance Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAC ![In: Theoretical Aspects of Computing - ICTAC 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings, pp. 112-121, 2013, Springer, 978-3-642-39717-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Wei Li 0025, Haishan Wan, Sheng Li |
An approach to the generalization of firewall rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, ICIS 2013, Niigata, Japan, June 16-20, 2013, pp. 201-206, 2013, IEEE Computer Society, 978-1-4799-0174-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Shui Yu 0001, Robin Doss, Wanlei Zhou 0001, Song Guo 0001 |
A general cloud firewall framework with dynamic resource allocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9-13, 2013, pp. 1941-1945, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Vijender Kumar Solanki, Kumar Pal Singh, M. Venkatesan, Sudhanshu Raghuwanshi |
Securing Networks Using Situation-Based Firewall Policy Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACNI ![In: Intelligent Computing, Networking, and Informatics, Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, ICACNI 2013, Raipur, Chhattisgarh, India, 12-14 June 2013, pp. 1029-1035, 2013, Springer, 978-81-322-1664-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Umniya Mustafa, Mohammad M. Masud 0001, Zouheir Trabelsi, Timothy Wood 0001, Zainab Al Harthi |
Firewall performance optimization using data mining techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, July 1-5, 2013, pp. 934-940, 2013, IEEE, 978-1-4673-2479-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Heba A. Kurdi, Madeeha Enazi, Auhood Abdullah Alfaries |
Evaluating Firewall Models for Hybrid Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMS ![In: Seventh UKSim/AMSS European Modelling Symposium, EMS 2013, 20-22 November, 2013, Manchester UK, pp. 514-519, 2013, IEEE, 978-1-4799-2578-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Abdul Razzaq, Ali Hur, Sidra Shahbaz, Muddassar Masood, Hafiz Farooq Ahmad |
Critical analysis on web application firewall solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISADS ![In: 11th International Symposium on Autonomous Decentralized Systems, ISADS 2013, Mexico City, Mexico, 6-8 March 2013, pp. 1-6, 2013, IEEE Computer Society, 978-1-4673-5068-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Juan Wang 0006, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng |
Towards a Security-Enhanced Firewall Application for OpenFlow Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings, pp. 92-103, 2013, Springer, 978-3-319-03583-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci |
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 133-147, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jun Long, Luda Wang, Zude Li |
Research and design of the firewall penetration technology serving to distributed cloud resource. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internetware ![In: Proceedings of the 5th Asia-Pacific Symposium on Internetware, Internetware 2013, Changsha, China, October 23-24, 2013, pp. 16:1-16:4, 2013, ACM, 978-1-4503-2369-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Hyeonwoo Kim, Wooguil Pak, Hongtaek Ju |
Correlation analysis between inference accuracy and inference parameters for stateless firewall policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: 15th Asia-Pacific Network Operations and Management Symposium, APNOMS 2013, Hiroshima, Japan, September 25-27, 2013, pp. 1-6, 2013, IEEE, 978-4-8855-2279-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
15 | Pritom Rajkhowa, Shyamanta M. Hazarika, Guillermo Ricardo Simari |
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSHINE ![In: Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers, pp. 527-542, 2013, Springer, 978-3-642-37948-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Sandeep Reddy Pedditi, Du Zhang, Chung-E. Wang |
FIEP: An initial design of a firewall information exchange protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: IEEE 14th International Conference on Information Reuse & Integration, IRI 2013, San Francisco, CA, USA, August 14-16, 2013, pp. 1-5, 2013, IEEE Computer Society, 978-1-4799-1050-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Seungjoon Lee, Manish Purohit, Barna Saha |
Firewall placement in cloud data centers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoCC ![In: ACM Symposium on Cloud Computing, SOCC '13, Santa Clara, CA, USA, October 1-3, 2013, pp. 52:1-52:2, 2013, ACM, 978-1-4503-2428-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Yan Xu, Zhaoxia Wei, Qingrong Tang |
Efficient Algorithm for Detecting Firewall Rule Conflict. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013, pp. 340-343, 2013, IEEE, 978-0-7695-4988-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Erkan Ozhan |
Güvenlik duvarı günlüklerinin makine öğrenmesi yöntemleri ile analizi ve bir model çıkartılması (The analysis of the firewall diaries through machine learning methods and producing a model) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
15 | Annie Shebanow, Richard Perez, Caroline Howard |
The Effect of Firewall Testing Types on Cloud Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Strateg. Inf. Technol. Appl. ![In: Int. J. Strateg. Inf. Technol. Appl. 3(3), pp. 60-68, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Rabiu Mukhtar, Ameer Al-Nemrat, Mamoun Alazab, Sitalakshmi Venkatraman, Hamid Jahankhani |
Analysis of firewall log-based detection scenarios for evidence in digital forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 4(4), pp. 261-279, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|